Just a few short years ago, virtual private networks (VPNs) were a novel technology to the masses. The advanced security and anonymity they offered were only for paranoids and dissidents. Fast forward to today’s internet with its daily headlines of massive data breaches, government snooping, and a Dark Web with an endless appetite for your personal information. Continue reading
If you want to make the most of the AWS cloud, then, Amazon EC2 and Amazon S3 are both important services to understand. This article explains what each service does, how you can use them together and which additional AWS services (such as EFS and EBS) you might wish to use in conjunction with EC2 and S3.
PSA (Professional Services Automation) and RMM (Remote Monitoring and Management) tools are both created to boost a service provider’s business, but they are aimed at different spheres.
Using PSA can help build business processes, while RMM is all about the ‘fine tuning’ of an internal technical support. In this article, we are going to help you choose the right tool first. Continue reading
In this article, we will overview the way to backup Microsoft SQL Database straight to Microsoft Azure. That might be helpful for both, backup and disaster recovery procedures. You will learn how to configure database backup to the cloud and how to implement a disaster recovery solution, using Azure VM instance.
Email marketing campaigns are perhaps one of the earliest advertising strategies that emerged with the advent of the internet era. However, marketers soon began to realize that as more and more users came onboard the ‘e-mail train’, the sheer quantity of prospective and existing customers that were now online made email marketing campaigns increasingly difficult to manage. Continue reading
You can never know when a disaster will occur to your cloud infrastructure. You can, however, prepare a cloud disaster recovery plan that enables you to restore operations quickly whenever disaster does strike your cloud. This article explains how. Continue reading
Choosing between NAS or iSCSI SAN is one of the cornerstones of modern data centers. The times when NAS was ridiculously slow to be used as a backend storage are gone. Now the choice is not so easy, so we are going to explain the main differences between NAS and iSCSI storage. Continue reading
Where can you find cloud certifications? If you choose to get a cloud certification, should you obtain one from a certain cloud vendor -- such as AWS, Azure or Google -- or should you pursue a general-purpose cloud certification? Which categories of cloud computing certifications are available currently? Keep reading for an overview of the main cloud computing certifications available today. Continue reading
WORM (write once, read many), is a storage system concept. Developers designed it to protect information that an organization does not want to be destroyed or altered in any way. With WORM-compliant storage, you can transfer information to a storage device or cloud storage, but, once you transfer the information, it cannot be changed. Continue reading
This article defines business continuity and disaster recovery discusses the differences between them and explains how to build a disaster recovery solution that addresses business continuity needs.
Information is the lifeblood of any organization, particularly when it is used to create valuable business insights or provide a competitive advantage. It is therefore essential that data – in whatever form it takes – is stored securely, but is also instantly accessible when needed. Continue reading